Pseudorandom generator

Results: 304



#Item
221Probabilistic complexity theory / Mathematical optimization / Computational complexity theory / Structural complexity theory / Complexity / Average-case complexity / P versus NP problem / NP-complete / Pseudorandom generator / Theoretical computer science / Applied mathematics / Complexity classes

Invitation to Complexity Theory Complexity theory provides new viewpoints on various phenomena that were once considered by past thinkers. By Oded Goldreich DOI: [removed][removed]

Add to Reading List

Source URL: www.wisdom.weizmann.ac.il

Language: English - Date: 2013-03-27 12:14:10
222Stream ciphers / Pseudorandomness / Search algorithms / Hashing / F-FCSR / Hash function / Cryptographic hash function / Feedback with Carry Shift Registers / Pseudorandom generator theorem / Cryptography / Theoretical computer science / Applied mathematics

Lightweight Sponge Stream F-FCSR f -function Analysis The GLUON family: a lightweight Hash function family based on FCSRs T. P. Berger1 , J. D’Hayer2 , K. Marquet2 , M. Minier2 , G. Thomas1

Add to Reading List

Source URL: www.aui.ma

Language: English - Date: 2012-07-13 06:37:48
223Diophantine approximation / Equidistributed sequence / Ergodic theory / Normal number / Pseudorandom number generator / Stoneham number / Normal distribution / Constructible universe / Net / Mathematics / Number theory / Mathematical analysis

Random Generators and Normal Numbers David H. Bailey1 and Richard E. Crandall2 20 March 2003 Abstract Pursuant to the authors’ previous chaotic-dynamical model for random digits of fundamental constants [5], we investi

Add to Reading List

Source URL: www.davidhbailey.com

Language: English - Date: 2012-11-07 15:21:51
224Formal sciences / Computational complexity theory / Randomness / Machtey Award / Randomness extractor / Pseudorandomness / Pseudorandom generator theorem / Symposium on Foundations of Computer Science / Randomized algorithm / Theoretical computer science / Applied mathematics / Computer science

December 17, 2013 David Zuckerman Department of Computer Science University of Texas at Austin 2317 Speedway, Stop D9500

Add to Reading List

Source URL: www.cs.utexas.edu

Language: English - Date: 2013-12-17 16:34:10
225Information theory / Key management / Random number generation / Hardware random number generator / Entropy / Pseudorandomness / Key / Cryptographic hash function / MD5 / Cryptography / Randomness / Pseudorandom number generators

R S A L A B O R A T O R I E S B U L L E T I N

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
226Pseudorandom number generators / Cryptography / Computational complexity theory / Pseudorandom generator theorem / Pseudorandomness / Itō diffusion / Mathematics / Mathematical analysis / Polynomials

PDF Document

Add to Reading List

Source URL: www.plouffe.fr

Language: English - Date: 2014-05-28 20:50:36
227Random number generation / Cryptographic hash function / Fortuna / Entropy / Linear feedback shift register / SHA-1 / Hash function / Cryptographically secure pseudorandom number generator / Linear congruential generator / Cryptography / Pseudorandom number generators / Key generation

PDF Document

Add to Reading List

Source URL: www.storage.jak-stik.ac.id

Language: English - Date: 2000-03-07 12:00:00
228X86 architecture / Information theory / Applied mathematics / Mathematics / CPUID / Machine code / Entropy / Random number generation / Linear congruential generator / Pseudorandom number generators / Randomness / Cryptography

Revisiting iOS Kernel (In)Security: Attacking the early random() PRNG Tarjei Mandt Azimuth Security [removed]

Add to Reading List

Source URL: mista.nu

Language: English - Date: 2014-03-12 22:15:16
229Verilog / Hardware random number generator / Pseudorandomness / Random seed / Random number generation / Entropy / Random number generator attack / Cryptographically secure pseudorandom number generator / Cryptography / Randomness / Pseudorandom number generators

TRNG1 True Random and Pseudorandom Number Generator Core

Add to Reading List

Source URL: www.ipcores.com

Language: English - Date: 2012-03-19 23:00:15
230Pseudorandomness / Pseudorandom generator / Key management / Cryptographic hash function / Mathematics / Computer science / Applied mathematics / Cryptography / Advantage

RZ 3627 (# [removed]Computer Science 18 pages

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2006-06-29 07:25:55
UPDATE